Modular analysis of network transmission protocols

Micah Adler*, Yair Bartal, John W. Byers, Michael Luby, Danny Raz

*Corresponding author for this work

Research output: Contribution to conferencePaperpeer-review

8 Scopus citations

Abstract

We propose a new model for the analysis of data transmission protocols in lossy communication networks. The overall goal of a data transmission protocol is to successfully transmit a message from the sender to the receiver. We study the performance of protocols in an adversarial setting where the loss pattern and latencies of packets are determined by an adversary. We advocate the modular decomposition of data transmission protocols into a time scheduling policy, which determines when packets are to be sent, and a data selection policy, which determines what data is to be placed in each sent packet. We concentrate on the data selection policy and require that the protocol will achieve high bandwidth utilization in transmitting any prefix of the transmitted message. The simple and universal data selection policy we introduce is probably close to optimal in the following sense: For any time scheduling policy and any network behavior, in the worst case prefix measure our data selection policy performs as well as any other data selection policy up to a constant additive term. Our explicit modular decomposition of a transmission protocol into two policies should be contrasted with existing network protocols such as TCP/IP. Our result shows that the performance of the overall transmission protocol would not degrade in performance (and could improve dramatically) if it used our universal data selection policy in place of its own. We therefore reduce the problem of designing a data transmission protocol to the task of designing a time scheduling policy.

Original languageAmerican English
Pages54-62
Number of pages9
DOIs
StatePublished - 1997
Externally publishedYes
EventProceedings of the 1997 5th Israel Symposium on Theory of Computing and Systems, ISTCS - Ramat-Gan, Isr
Duration: 17 Jun 199719 Jun 1997

Conference

ConferenceProceedings of the 1997 5th Israel Symposium on Theory of Computing and Systems, ISTCS
CityRamat-Gan, Isr
Period17/06/9719/06/97

Fingerprint

Dive into the research topics of 'Modular analysis of network transmission protocols'. Together they form a unique fingerprint.

Cite this